System and methods providing anti-virus cooperative enforcement

a technology of anti-virus and cooperative enforcement, applied in the field of information processing, can solve problems such as viruses infiltration, damage to local computer systems, and misusing those systems, and achieve the effects of preventing viruses from infiltrating the external environment, and unauthorized access to external data

Inactive Publication Date: 2003-03-20
CHECK POINT SOFTWARE TECH INC
View PDF29 Cites 510 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In both cases, maintaining security and controlling what information a computer user could access was relatively simple because the overall computing environment was limited and clearly defined.
Specific challenges, for example, include the following: (1) attacks by perpetrators (hackers) capable of damaging the local computer systems, misusing those systems, or stealing proprietary data and programs; (2) unauthorized access to external data (e.g., pornographic or other inappropriate Web sites); (3) infiltration by viruses and "Trojan horse" programs; and (4) employee abuse of business computer resources for unauthorized personal activities (e.g., accessing on-line games or streaming audio/video programs).
However, one of the implications of the increasing number of devices occasionally connected to different networks is that traditional corporate firewall technologies are no longer effective.
Traditional firewall technology guarding a network boundary does not protect against traffic that does not traverse that boundary.
It does not regulate traffic between two devices within the network or two devices outside the network.
A corporate firewall provides some degree of protection when a device is connected to that particular corporate network, but it provides no protection when the device is connected to other networks.
In addition, a traditional firewall may not protect against intrusions originating from a remote device which is connected to a corporate (or similar) network.
Although end point security and anti-virus...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and methods providing anti-virus cooperative enforcement
  • System and methods providing anti-virus cooperative enforcement
  • System and methods providing anti-virus cooperative enforcement

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following description will focus on the presently-preferred embodiment of the present invention, which is implemented in a desktop application operating in an Internet-connected environment running under a desktop operating system, such as the Microsoft.RTM. Windows operating system running on an IBM-compatible PC. The present invention, however, is not limited to any one particular application or any particular environment. Instead, those skilled in the art will find that the system and methods of the present invention may be advantageously embodied on a variety of different platforms, including Macintosh, Linux, BeOS, Solaris, UNIX, NextStep, FreeBSD, and the like. Therefore, the description of the exemplary embodiments that follows is for purposes of illustration and not limitation.

[0035] I. Computer-Based Implementation

[0036] A. Basic System Hardware (e.g., for Desktop and Server Computers)

[0037] The present invention may be implemented on a conventional or general-pu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system providing methods for anti-virus cooperative enforcement is described. In response to a request from a device for access to protected resources, such as a network or protected data, a determination is made as to whether an anti-virus policy applies to the request for access made by the device. If an anti-virus policy is applicable, information pertaining to virus protection available on the device is collected. The virus protection information that is collected is evaluated to determine whether the device is in compliance with the anti-virus policy. If the device is determined to be in compliance with the anti-virus policy, the device is allowed to access the protected resources.

Description

[0001] The present application is related to and claims the benefit of priority of the following commonly-owned provisional application(s): application Ser. No. 60 / 372,907 (Docket No. VIV / 0006.00), filed Apr. 15, 2002, entitled "System and Methods Providing Anti-Virus Cooperative Enforcement", of which the present application is a non-provisional application thereof. The present application is related to and claims the benefit of priority of the following commonly-owned non-provisional application(s): application Ser. No. 09 / 944,057 (Docket No. VIV / 0003.01), filed Aug. 30, 2001, entitled "System Providing Internet Access Management with Router-based Policy Enforcement", of which the present application is a Continuation-in-part application thereof; and application Ser. No. 10 / 159,820 (Docket No. VIV / 0005.01), filed May 31, 2002, entitled "System and Methodology for Security Policy Arbitration", of which the present application is a Continuation-in-part application thereof. The discl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/28H04L29/06
CPCH04L12/2856H04L12/2876H04L63/0263H04L63/145H04L63/20Y10S707/99945
Inventor HERRMANN, CONRAD K.BAHARESTAN, KAVEHBENTLEY, JOSEPH E.LEROY, JESS A.
Owner CHECK POINT SOFTWARE TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products